Multivariate Linear Cryptanalysis: The Past and Future of PRESENT
نویسندگان
چکیده
Extensions of linear cryptanalysis making use of multiple approximations such as multidimensional linear cryptanalysis are an important tool in symmetric-key cryptanalysis, among others being responsible for the best known attacks on ciphers such as Serpent and present. At CRYPTO 2015, Huang et al. provided a refined analysis of the key-dependent capacity leading to a refined key equivalence hypothesis, however at the cost of additional assumptions. Their analysis was recently extended by Blondeau and Nyberg to also cover an updated wrong key randomization hypothesis, using similar assumptions. As a consequence, the effectiveness of multidimensional linear attacks seems significantly reduced, e.g. to only 24 rounds for present. It is therefore an important open problem how to take key dependent behaviour for both right and wrong keys into account without introducing other limiting assumptions in the process. In this paper, we address this issue by proposing multivariate linear cryptanalysis as a new technique for using multiple linear approximations. Based on multivariate statistics and featuring a novel distinguishing technique based on quadratic discriminant analysis, it allows more realistic modelling of key dependence, while not relying on the limiting assumptions of previous work. Furthermore, it comes with a flexible signal/noise decomposition approach to allow for a realistic estimation of correlations. As an application of multivariate linear cryptanalysis, we provide attacks on 26 and 27 rounds (the latter marginally faster than exhaustive search) of present under much more realistic assumptions than previous work.
منابع مشابه
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملComparison of time perspective dimensions in students with and without existential anxiety
This study aimed to compare the dimensions of time perspective in students with and without existential anxiety. The research method was causal-comparative. the statistical population included all students of Ardabil Islamic Azad University in the academic year 2020-2021. The research sample consisted of 80 students (40 students with existential anxiety and 40 students without existential anxie...
متن کاملTeachers’ Professional Competencies: Past, Present, and Future
Teachers’ Professional Competencies: Past, Present, and Future M. Rezaai, Ph.D.* The purpose of this paper is to review the expected professional competencies throughout the history of teacher training in Iran. As such it covers both the past, covering the period from teacher training inception in 1918 to the Islamic revolution in 1979; and the present, since the revolution. Of course t...
متن کاملMizaj past, present and future
Temperament (Mizaj), as an individual factor, has great importance in traditional medicine and its use in diagnosis and treatment of diseases, as well as the individual lifestyle is very common. Since medicine moves toward Personalized Medicine, the root of individual differences will find its position in different aspects of medicine in early future. In traditional medicine, temperament is ...
متن کاملA new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016